<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multiple Portals for Global protect -Configuration check-Inputs needed in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352776#M87234</link>
    <description>&lt;P&gt;two domains resolving to same IP, for palo alto you are using only one IP. the Firewall does not care about Public-domains. as i mentioned earlier :&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;another soultion would be same gateway, seperation based on users , and you can also define different IP pool for these non-corporate users and the networks that should they access with split-tunneling and add/edit your security policies as needed ."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;and for portal you change nothing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good Luck.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 15:01:28 GMT</pubDate>
    <dc:creator>Abdul-Fattah</dc:creator>
    <dc:date>2020-09-29T15:01:28Z</dc:date>
    <item>
      <title>Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352667#M87224</link>
      <description>&lt;P&gt;Hello ;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For one our Customer running PA 3200 Series in HA having GP License ( HIP checks)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently the GP Portal and Gateway have common Interface&amp;nbsp; . The GP URL is vpn.connection.it ( sample name)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The requirement is that&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Internal Users use&amp;nbsp; the URL&amp;nbsp; :&amp;nbsp; internal.vpn.connection.it&lt;/P&gt;&lt;P&gt;External Users(Partners) use the URL : external.vpn.connection.it&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Users are part of different user groups .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So can we achive this using the same ( Single Public ) IP address or do we need two Public IP address&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We can to use different HIP profiles for Internal and External users .&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do we need to create two different tunnel interface or loopbacks ? or two different gateways ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:22:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352667#M87224</guid>
      <dc:creator>FWPalolearner</dc:creator>
      <dc:date>2020-09-29T10:22:35Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352707#M87225</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you can achive this with configuring an Internal Gateway and an external Gateway and one or two portal, the Internal Gateway is an interface on your internal Network, External Gateway accessed from Outside normally out from internet (Public-IP)&amp;nbsp; - Tunnel interface required here.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;for more information check these out&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/8-1/globalprotect-admin/globalprotect-quick-configs/mixed-internal-and-external-gateway-configuration" target="_blank"&gt;https://docs.paloaltonetworks.com/globalprotect/8-1/globalprotect-admin/globalprotect-quick-configs/mixed-internal-and-external-gateway-configuration&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClH1CAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClH1CAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:53:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352707#M87225</guid>
      <dc:creator>Abdul-Fattah</dc:creator>
      <dc:date>2020-09-29T10:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352732#M87227</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/129900"&gt;@Abdul-Fattah&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are already have an Internal gateway which is being used currently only by Internal users when they are in Corporate network&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The goal is this exercise is when Users connect to the GP outside of the company network ( internet or at home)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All the Corporate Users should use the URL&amp;nbsp; internal.vpn.X . Different HIP profile , different IP Pool . different zone and different rules&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All the Non Corporae users&amp;nbsp;should use the URL&amp;nbsp; external.vpn.X . Different HIP profile , different IP Pool . different zone and different rules&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So my Query is whether we need two Tunnel Interfaces( One for each external Gateway) and two Loop backs ( one for each Portal )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So do i have to create two external gateways using two different loopbacks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and in the Portal settings define difference Address( FQDN) ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also , do i need two Public IPs ? or 1 can solve the purpose&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 12:17:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352732#M87227</guid>
      <dc:creator>FWPalolearner</dc:creator>
      <dc:date>2020-09-29T12:17:02Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352752#M87229</link>
      <description>&lt;P&gt;then what you need is 2 external gateways, two tunnels, two public Ips.&lt;/P&gt;&lt;P&gt;another soultion would be same gateway, seperation based on users , and you can also define different IP pool for these non-corporate users and the networks that should they access with split-tunneling and add/edit your security policies as needed .&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:19:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352752#M87229</guid>
      <dc:creator>Abdul-Fattah</dc:creator>
      <dc:date>2020-09-29T13:19:45Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352754#M87231</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/133520"&gt;@FWPalolearner&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suggestion is to always avoid multiple ip address on same interface like you would avoid a plague/covid. I cannot claim I have deploy lots of GPs, but I haven't yet saw a real need to configure multiple portals on single device, so I&amp;nbsp; will try to avoid such setup as well.&lt;/P&gt;&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/129900"&gt;@Abdul-Fattah&lt;/a&gt;&amp;nbsp;mentioned you can provide single portal and once the user authenticate you can have group/user base separation (have different ip pool, dns, access etc for each user group). This would be the easiest way to have complete separation between internal users and contractors/3rd-party. The problem with this approach is that both type of users will need to use same authentication type. You can use different domain for user authentication, but the the type (LDAP, RADIUS, etc) must be the same for both (if you use mfa over radius you can be creative, but it is up to the mfa and not the fw). And as you can imagine both type of users will use the same vpn address.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you&amp;nbsp;&lt;U&gt;really&amp;nbsp;&lt;/U&gt; want internal users to use one address and contractors/external user to use completely different address - the only way to achieve this is to have second portal/gateway. As mentioned I would avoid secondary IP, instead I would recommend to use loopback (configure loopback with public ip, put it in untrust/outsie zone and use it for the gp portal and gw).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only benefit I can think of is that you can apply different authentication type for each user group, so it is interesting for me to understand the reason why you need separate addresses&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:53:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352754#M87231</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2020-09-29T13:53:55Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352755#M87232</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/129900"&gt;@Abdul-Fattah&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your inputs ; really appreciate&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Customer requirement is to use two different URLs . I understand that we use different user groups&amp;nbsp; but user groups are already in place&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thre requirement is to have different URL and Different Portal&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So what i understood , we need below on PA cluster - can you please confirm :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) two GP Gateways with two Loopbacks ?&amp;nbsp; two GP portals - where in - for one we define the URL for external and for other the internal one&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) two tunnel interfaces , two loopbacks - with different IPs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) two zones - one for Internal and one for external ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I still have doubt, why cant we use the same Public IP as we can make both DNS entries to resolve to same IP&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 14:07:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352755#M87232</guid>
      <dc:creator>FWPalolearner</dc:creator>
      <dc:date>2020-09-29T14:07:52Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352776#M87234</link>
      <description>&lt;P&gt;two domains resolving to same IP, for palo alto you are using only one IP. the Firewall does not care about Public-domains. as i mentioned earlier :&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;another soultion would be same gateway, seperation based on users , and you can also define different IP pool for these non-corporate users and the networks that should they access with split-tunneling and add/edit your security policies as needed ."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;and for portal you change nothing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good Luck.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:01:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352776#M87234</guid>
      <dc:creator>Abdul-Fattah</dc:creator>
      <dc:date>2020-09-29T15:01:28Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352791#M87235</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/133520"&gt;@FWPalolearner&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can setup both DNS records to resolve to same IP, but:&lt;/P&gt;&lt;P&gt;- First you need to apply wildcard certificate on the portal or use certificate with SAN (subject alternative names)&lt;/P&gt;&lt;P&gt;- Even the users are pointed to different addresses they are still ended on the exact same portal, so they will be prompted with exact same authentication. This really annoys me with GP portal, there is no way to use multiple authentication realms and provide a way for the user to select/navigate to required auth realm.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So as long as you will use the same authentication type (LDAP, radius, etc) for all users (external and internal) you should be fine using two DNS records pointing to the same ip and having one portal. The important think here is the SSL certificate that will be used for the portal - either it must be wildcard (to match both urls) or it must list both in SAN (subject alternative names).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your really don't need two gateways. You can use same gateways for both external and internal users, and using user group to apply different settings. The problem is again with the address, however during GP portal config you can specify different gateway addresses for each user group. So you can actually the exact same DNS records that you are using for the portal. And for the GP gateway you need to use the same SSL certificate (either wildcard or with SAN)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:10:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352791#M87235</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2020-09-29T15:10:08Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352792#M87236</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you can leverage "authentication-sequence" and select multiple authentication types/profiles (LDAP,Radius,Local..) and use it for Portals and Gatways.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:23:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352792#M87236</guid>
      <dc:creator>Abdul-Fattah</dc:creator>
      <dc:date>2020-09-29T15:23:57Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352793#M87237</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/129900"&gt;@Abdul-Fattah&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You are absolutely right... I forgot about the authentication sequence, thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:30:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352793#M87237</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2020-09-29T15:30:29Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352802#M87239</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/129900"&gt;@Abdul-Fattah&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can't thank you enough for your support and inputs.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will share my change plan with you to have a final look in it please. I will share it quickly&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 19:30:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352802#M87239</guid>
      <dc:creator>FWPalolearner</dc:creator>
      <dc:date>2020-09-29T19:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352960#M87256</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/129900"&gt;@Abdul-Fattah&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is what i am planning can you and provide your input&lt;/P&gt;&lt;P&gt;************************************&lt;/P&gt;&lt;P&gt;What we have now&lt;/P&gt;&lt;P&gt;the VPN URL we are using now is vpn.connect.it which resolves to the IP of Public Interface of the firewall&lt;/P&gt;&lt;P&gt;FW Public Interface : x.x.x.x&lt;/P&gt;&lt;P&gt;FW public zone : INTERNET&lt;/P&gt;&lt;P&gt;Loopback Interface : loopback.1 with an IP 192.168.75.1 bind to a zone called GP&lt;BR /&gt;Tunnel interface : tunnel.1 Bind to zone GP&lt;/P&gt;&lt;P&gt;Portal Config :&lt;/P&gt;&lt;P&gt;We have the Authentication sequence and a Wildcard in the SSL Service Profile for *.connect.it&lt;/P&gt;&lt;P&gt;We are using loopback.1 as the Interface . We are having the User groups defined in the Agent config&lt;/P&gt;&lt;P&gt;In the Agent config in the External Section , we have defined Host name&amp;nbsp; vpn.connect.it&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Gateway Config :&lt;/P&gt;&lt;P&gt;We are using the same loopback.1&lt;/P&gt;&lt;P&gt;same wildcard&lt;/P&gt;&lt;P&gt;In the agent we are using tunnel.1&lt;/P&gt;&lt;P&gt;and we have a Pool allocated for all the users defined in the user group&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;----------------------------------------------------------------------------------------&lt;BR /&gt;Now as we want separate Portal for Corp users and Partners , here is my plan&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Create another DNS entrie for&lt;/P&gt;&lt;P&gt;partner.external.it&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Corp users will continue to use vpn.connect.it&lt;/P&gt;&lt;P&gt;both will resolve to x.x.x.x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Create a new Loopback loopback.2 with an IP 192.168.76.1 and bind to zone GP-EXT&lt;BR /&gt;Create a new Tunnel interface tunnel.2 and bind to zone GP-EXT&lt;/P&gt;&lt;P&gt;Portal Config :&lt;/P&gt;&lt;P&gt;Create a new Portal with loopback.2 and same auth sequence ;same wildcard&lt;BR /&gt;in the agent config in external section , define partner.external.it and in user groups only external AD users&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Gateway Config&lt;/P&gt;&lt;P&gt;Use Loopback.2&lt;BR /&gt;same wildcard&lt;BR /&gt;In the agent , define tunnel.2 and separate pool for external users&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Configure the required Firewall rules for new zone GP-EXT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Point here is&lt;/P&gt;&lt;P&gt;currently&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;x.x.x.x is natted to 192.168.75.1&lt;/P&gt;&lt;P&gt;So how to NAT it to 192.168.76.1 for external users ??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do i have to use another Public IP then&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 12:25:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/352960#M87256</guid>
      <dc:creator>FWPalolearner</dc:creator>
      <dc:date>2020-09-30T12:25:58Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/353079#M87273</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/133520"&gt;@FWPalolearner&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From your explanation I don't believe you will need the second portal/gateway/loopback/tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Create new DNS record for external.connect.it to FW public x.x.x.x&lt;/P&gt;&lt;P&gt;2. Under the current portal create two "agent" configs based on user group, one for internal and one for partner users.&lt;/P&gt;&lt;P&gt;3. In first config set for external gateway "internal.connect.it", and for second agent config set "external.connect.it"&amp;nbsp;&lt;/P&gt;&lt;P&gt;4. Under the current gateway create two client settings based on the two user groups (gateway -&amp;gt; agent -&amp;gt; client settings).&lt;/P&gt;&lt;P&gt;5. Under each client settings configure IP pool. Important note here is that you&amp;nbsp;&lt;U&gt;must not use Client IP Pool&amp;nbsp;&lt;/U&gt;(gateway -&amp;gt;agent -&amp;gt; client ip pool). On this tab you define one single IP pool for all connected users, no matter which user group they are. To be able to configure different ip pool for each user group you must remove any config from client ip pool tab and put it under the client settings&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And that should be enough. If you think for a moment only difference between the two "portals" is the FQDN that users are using, which really doesn't matter as long as you have a valid certificate to cover both addresses. Everything else should be standard user group based separation which you can accomplish with single portal and gateway.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 18:20:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/353079#M87273</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2020-09-30T18:20:33Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/353080#M87274</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp; Thanks a lot . This is now very much easy and you made it very clear&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just have last doubt still .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can i create a second tunnel interface and bind it to a new zone&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This way i will create two GP gateways with two different tunnel interfaces - one for Corp and other for External&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only point is this will provide more security because we will have different Zones and can use them specifically&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly let me know your feedback on this&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Again Many many Thanks . you are a saviour &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 18:27:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/353080#M87274</guid>
      <dc:creator>FWPalolearner</dc:creator>
      <dc:date>2020-09-30T18:27:59Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/353096#M87276</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/133520"&gt;@FWPalolearner&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you want to have separate gateway you definitely must use different IP, because you cannot have more than one GP gateway (or portal) on same interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I would suggest to think for a moment if you really gain any benefit separating users into zones:&lt;/P&gt;&lt;P&gt;1. You already separate users based on user groups and assign different IP pools. Even that both type of users (internal and partners) are coming from same zone you still can use source user group and source ip to granular control over the user access.&lt;/P&gt;&lt;P&gt;2. If you worry about restricting access between VPN users (partner user connected to vpn to reach internal vpn user), I am not 100% sure at the top of my head, but I believe you can simply configure explicit &lt;U&gt;intrazone&lt;/U&gt; rule to control the traffic between users.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Again even that all users are associated with same zone you still have other methods to differentiate between them.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 18:45:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/353096#M87276</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2020-09-30T18:45:24Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/353100#M87278</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My public interface is eth1/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I have created a loopback called loopback.1 with private ip 192.168.1.75&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am doing a nat to translate my public ip to this loopback ip address&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am currently using this loopback.1 in both gateway and portal&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I can still create a gateway with same loopback . However as loopback is/32 it does not give me option to choose ip address when creating the second gateway but it still accepts it as ip address is optional.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I believe we can still create two gateways ?&lt;/P&gt;&lt;P&gt;Or you mean that second gateway without ip address is of no use ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 19:05:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/353100#M87278</guid>
      <dc:creator>FWPalolearner</dc:creator>
      <dc:date>2020-09-30T19:05:50Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/353104#M87280</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/133520"&gt;@FWPalolearner&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I understand that you use loopback for GP portal and gateway and use NAT to translate the public to the loopback. I still don't understand why you do this way instead of use the eth1/1 in the GP portal and gateway on first place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But let discuss the other point - "&lt;SPAN&gt;But I can still create a gateway with same loopback" even if you somehow manage to use same interface/ip on multiple gateway you should receive error during commit. Think about it - all comes done to sockets, creating GP gateway will create TCP socket which FW will listen for connections. Sockets consists of ip and port and you can have different services/application on different combination of ip and port. If you create second GP gateway you need to create second socket and since you cannot use different port (always using the standard port for SSL or IPSec)&amp;nbsp; the only part you can change is the ip. Assigning same int and ip to both GP gateways will try to create two exactly the same sockets which will generate commit error.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;And the same concept for the sockets apply for your NAT rules. I assume that you have NAT rule says "any public source to dest x.x.x, nat to any public source to dest 192.168.1.75". If you create second NAT rule similar to above, but with dest 192.168.1.76, the second nat will never hit (because the first math will be applied). Again you can play with ports as GP doesn't allow you change default ports, so the only way for the fw to apply the different nat rules is to use source ip address as matching criteria, but this defied&amp;nbsp;the purpose of remote access vpn, because you will need to know from which public ip will the users connect.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 19:24:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/353104#M87280</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2020-09-30T19:24:54Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple Portals for Global protect -Configuration check-Inputs needed</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/353105#M87281</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp; thanks a lot .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Makes sense . I will make use of Ad groups and ip pool and keep it simple.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks . Good learning for me&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Glad we have people like you in the community to share the knowledge&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/129900"&gt;@Abdul-Fattah&lt;/a&gt;&amp;nbsp;thanks to you too .&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 19:28:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-portals-for-global-protect-configuration-check-inputs/m-p/353105#M87281</guid>
      <dc:creator>FWPalolearner</dc:creator>
      <dc:date>2020-09-30T19:28:38Z</dc:date>
    </item>
  </channel>
</rss>

